5.securing the Boot Procss and Hardware Resources

Requiring Boot Loader Passwords You can secure the boot process with a secure epassword to prevent someone from bypassing the user authentication step. This can work in conjunction with password protection for the BIOS. Note that while using a bootloader passwrd laone will stop a user from editing the bootloader configuration during the boot process, it will not prevent a user from booting from and alterantive boot media such as optical disks or pen drives....

January 7, 2024 · nolleh

4.working With Passwords

How Passwords Are Stored The system verifies authenticity and identity using user credentials. Originally, encrypted passwords wer stored in the /etc/passwd file, which was readable by everyone. this mde it rather easy for passwords to be craked. On modern systems. passwords are actually stored in an encrypted format in a secondary file named etc/shadow Onyly those with root access can read or modify this file. Password Encrpytion Protecting passwords has became a curucial element of security....

January 7, 2024 · nolleh

3.sudo Process Isolation Limiting Hardware Access and Keeping Systems Current

The sudoers File /etc/sudoers contains a lot of documentation in it about how to customize. Most Linux distributions now prefer you add a file in the directory etc/sudoers.d with a name the same as user. this file contains the individual user’s sudo configuration, and one should leave the main configuration file untouched except for changeds that affect that affect all users. sudo commands and any failures are logged in …...

January 7, 2024 · nolleh

2.understanding Linux Security

User Accounts Linux kernel authenticated users to access files and applications. while each user is identified by a unique integer (the user id or UID), a separate database associates a username with each UID. Types of Accounts By default, Linux distinguishes between several account types in order to isolate processes and workloads. Linux has fourtypes of accounts: root System Normal Network For a safe working env, it is advised to grant minimum privileges possible and necessary to accounts, and remove inactive accounts....

January 6, 2024 · nolleh

4.manipulating Postscript and Pdf Files

Working with PostScript and PDF PostScript is a standard page description language. it effectively manages scalilng of fonts and vector graphics to provide quality printouts. The format itself is a language that Adobe developed in the early 1980s to enable the transfer of data to printers. Feature of PostScript are: it can be used on any printer that is PostScript-compatible, i.e., any modern printer. Any program that understands the PostScript specification can print to it....

January 6, 2024 · nolleh